Loading...
Search for: haghighat--a--t
0.146 seconds

    An efficient algorithm for bandwidth-delay constrained least cost multicast routing

    , Article 2008 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2008, Niagara Falls, ON, 4 May 2008 through 7 May 2008 ; 2008 , Pages 1641-1645 ; 08407789 (ISSN) ; 9781424416431 (ISBN) Forsati, R ; Mahdavi, M ; Torghy Haghighat, A ; Ghariniyat, A ; Sharif University of Technology
    2008
    Abstract
    The advent of various real-time multimedia applications in high-speed networks creates a need for quality of service (QoS) based multicast routing. Two important QoS constraints are the bandwidth constraint and the end-to-end delay constraint. The QoS based multicast routing problem is a known NP-complete problem that depends on (1) bounded end-to-end delay and link bandwidth along the paths from the source to each destination, and (2) minimum cost of the multicast tree. In this paper we describe a new representation, called node parent index (NPI) representation, for representing trees and describe harmony operations accord to this representation. The presented algorithm is based on the... 

    Thermo-hydro-mechanical modeling of impermeable discontinuity in saturated porous media with X-FEM technique

    , Article Engineering Fracture Mechanics ; Volume 96 , December , 2012 , Pages 701-723 ; 00137944 (ISSN) Khoei, A. R ; Moallemi, S ; Haghighat, E ; Sharif University of Technology
    2012
    Abstract
    In this paper, the extended finite element method is presented for thermo-hydro-mechanical (THM) modeling of impermeable discontinuities in saturated porous media. The X-FEM technique is applied to the THM governing equations for the spatial discretization, followed by a generalized Newmark scheme for the time domain discretization. The displacement field is enriched by the Heaviside and crack tip asymptotic functions, and the pressure and temperature fields are enriched by the Heaviside and appropriate asymptotic functions. The process is accomplished by partitioning the domain with triangular sub-elements. Numerical examples are presented to demonstrate the capability of proposed technique... 

    Evaluation of the simulated material microstructures using the image processing and image analyzing methods

    , Article Journal of Testing and Evaluation ; Volume 34, Issue 6 , 2006 , Pages 507-514 ; 00903973 (ISSN) Hafez Haghighat, S. M ; Karimi Taheri, A ; Sharif University of Technology
    American Society for Testing and Materials  2006
    Abstract
    With the development of computing systems for data processing, the image processing and image analyzing methods have been developed on the basis of pixel assessment. These methods can analyze and detect the images by assigning a value for each pixel and using the matrices calculations. In the present research, two methods have been used to assess the simulated material microstructures. In the first method, the vertices of the microstructure are counted to determine accurately the mean grain size by the Euler's relationship, while in the second method, the image processing and image analyzing methods are utilized to assess the microstructure image. To verify the accuracies of the methods... 

    Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing

    , Article Computer Communications ; Volume 31, Issue 10 , 2008 , Pages 2505-2519 ; 01403664 (ISSN) Forsati, R ; Toroghi Haghighat, A ; Mahdavi, M ; Sharif University of Technology
    2008
    Abstract
    The advent of various real-time multimedia applications in high-speed networks creates a need for quality of service (QoS) based multicast routing. Two important QoS constraints are the bandwidth constraint and the end-to-end delay constraint. The QoS based multicast routing problem is a known NP-complete problem that depends on (1) bounded end-to-end delay and link bandwidth along the paths from the source to each destination, and (2) minimum cost of the multicast tree. In this paper, we presents novel centralized algorithms to solve the bandwidth-delay-constrained least-cost multicast routing problem based on the harmony search (HS) algorithm. Our first algorithm uses modified Prüfer... 

    An analytical and experimental investigation on the normal grain growth in metals using the Monte Carlo method

    , Article Materials and Design ; Volume 28, Issue 9 , 2007 , Pages 2533-2539 ; 02613069 (ISSN) Hafez Haghighat, S. M ; Karimi Taheri, A ; Sharif University of Technology
    Elsevier Ltd  2007
    Abstract
    The prediction of material microstructure is of great interest to the material designers since the property and performance of materials depend strongly on their microstructures. In this work, a Monte Carlo approach is used to investigate the normal grain growth of aluminum and pure copper. The grain growth was calculated at certain temperatures using the grain growth law and compared with the simulation results by varying the Q as a parameter of simulation lattice orientation for pure aluminum. Also the results predicted by the Monte Carlo method showed a good agreement with the experimental results of grain growth of pure cooper. It was found that increase in Q increases the accuracy of... 

    Investigation of limiting grain size and microstructure homogeneity in the presence of second phase particles using the Monte Carlo method

    , Article Journal of Materials Processing Technology ; Volume 195, Issue 1-3 , 2008 , Pages 195-203 ; 09240136 (ISSN) Haghighat, S. M. H ; Karimi Taheri, A ; Sharif University of Technology
    2008
    Abstract
    The prediction of material microstructure is of great interest to the material designers since the property and performance of materials depend strongly on their microstructures. In this research the Monte Carlo method and grain growth phenomenon have been used to predict the limiting grain size in the presence of second phase particles. The results showed a good agreement with the previous published results predicted by the analytical models. It was found that the lattice orientation parameter, Q, strongly affects the kinetic of the grain growth. The experimental and theoretical results of limiting grain size predicted by Monte Carlo method showed that by decreasing the value of Q the... 

    An efficient and provably-secure coercion-resistant e-voting protocol

    , Article 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013 ; 2013 , Pages 161-168 ; 9781467358392 (ISBN) Haghighat, A. T ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    2013
    Abstract
    We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-votingprotocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n2) to O(n), where n is the number of votes or voters (whichever is the maximum). Note that since the operations under consideration are time-consuming (e.g., public-key encryption), the improvement is quite substantial. As a rough comparison, consider a nation-wide election with around ten million voters/votes. Assuming each operation takes one microsecond, and no parallelization is used, one can see a huge difference: our protocol tallies the votes in 10 seconds, while the JCJ protocol requires over 3... 

    A bi-level approach for optimal contract pricing of independent dispatchable DG units in distribution networks

    , Article International Transactions on Electrical Energy Systems ; Volume 26, Issue 8 , 2016 , Pages 1685-1704 ; 20507038 (ISSN) Sadeghi Mobarakeh, A ; Rajabi Ghahnavieh, A ; Haghighat, H ; Sharif University of Technology
    John Wiley and Sons Ltd  2016
    Abstract
    Distributed generation (DG) units are increasingly installed in the power systems. Distribution companies (DisCo) can opt to purchase the electricity from DG in an energy purchase contract to supply the customer demand and reduce energy loss. This paper proposes a framework for optimal contract pricing of independent dispatchable DG units considering competition among them. While DG units tend to increase their profit from the energy purchase contract, DisCo minimizes the demand supply cost. Multi-leader follower game theory concept is used to analyze the situation in which competing DG units offer the energy price to DisCo and DisCo determines the DG generation. A bi-level approach is used... 

    Minimal assumptions to achieve privacy in e-voting protocols

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013 Haghighat, A. T ; Kargar, M. A ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary,... 

    A mesh-independent finite element formulation for modeling crack growth in saturated porous media based on an enriched-FEM technique

    , Article International Journal of Fracture ; Vol. 188, issue. 1 , 2014 , p. 79-108 Khoei, A. R ; Vahab, M ; Haghighat, E ; Moallemi, S ; Sharif University of Technology
    2014
    Abstract
    In this paper, the crack growth simulation is presented in saturated porous media using the extended finite element method. The mass balance equation of fluid phase and the momentum balance of bulk and fluid phases are employed to obtain the fully coupled set of equations in the framework of u - p formulation. The fluid flow within the fracture is modeled using the Darcy law, in which the fracture permeability is assumed according to the well-known cubic law. The spatial discritization is performed using the extended finite element method, the time domain discritization is performed based on the generalized Newmark scheme, and the non-linear system of equations is solved using the... 

    CO2/N2 Mixed Gas Separation in Glycerol Liquid Membrane Containing Sodium Carbonate Carriers

    , M.Sc. Thesis Sharif University of Technology Haghighat, Parsa (Author) ; Bastani, Darush (Supervisor)
    Abstract
    In this research, initially the Glycerol liquid membrane with dissolved sodium carbonate carriers, which is supported by CA porous filter, was prepared. The effects of Na2CO3 concentration and pressure difference on gas permeability were investigated. Permeability of CO2 and N2 were measured at pressure difference of 0.7, 1.6, 2.1 and 2.8 bar with carbonate sodium concentration of 0, 1 and 2 mol/lit. Permeability of CO2 was found to be higher than N2. Increasing the pressure difference resulted in an increase in the N2 permeability coefficient while decreased the CO2 permeability coefficient. Increasing the concentration of sodium carbonate increased the CO2 permeability drastically but... 

    Influence of Shear Wall Positioning in Design of Concrete Frames

    , M.Sc. Thesis Sharif University of Technology Haghighat, Reza (Author) ; Maleki, Shervin (Supervisor)
    Abstract
    Numerous research is available in the literature regarding shear walls. These have considered parameters like wall cross-section, Reinforcement configuration, boundary elements, etc. In addition, seismic and wind loading behavior has been discussed. Currently, the software ETABS is used extensively in automatic design of shear walls, The programs design bases are investigated in this thesis in ragards to flexural, shear and boundary elements of shear walls under seismic loading. The attachment of wall elements to frame (column) elements is of particular interest in this study  

    Fraud Detection in Financial Transactions

    , M.Sc. Thesis Sharif University of Technology Haghighat, Mohammad (Author) ; Beigy, Hamid (Supervisor)
    Abstract
    With development of electronic payment infrastructures and increase of payment transactions in result, abusing these infrastructures and fraudulent efforts has been increased. Problem of “Fraud Detection in Financial Transactions” is finding these illegal/abnormal transactions while many other legitimate transactions exist. Goal of this thesis is providing a method for fraud detection in financial transactions using representation learning. Many approaches are used for solving fraud detection including classic data mining algorithms and deep learning based methods, which are compared in this thesis. We also covered diverse feature engineering and representation learning ideas for improving... 

    Range-Doppler Map Generation in the Presence of Sparse Clutter for Multistatic Radar

    , M.Sc. Thesis Sharif University of Technology Haghighat, Soheil (Author) ; Karbasi, Mohammad (Supervisor)
    Abstract
    Multistatic radar has several advantages over monostatic radar (such as better detection), which are due to the use of different viewing angles and the difference in their clutter characteristics. Clutter in many applications (such as marine applications) has the property of being sparse in certain dictionaries. Therefore, the investigation of sparse clutter (such as sea clutter) is of particular importance. It is worth noting that the detection of targets in the vicinity of the sea faces difficulties due to the dynamics of the sea, which causes the Doppler spectrum to change with time and change in space. Considering the fact that the sea clutter is sparse clutter, one of the powerful... 

    Intrusion detection via fuzzy-genetic algorithm combination with evolutionary algorithms

    , Article 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007; 1st IEEE/ACIS International Workshop on e-Activity, IWEA 2007, Melbourne, VIC, 11 July 2007 through 13 July 2007 ; July , 2007 , Pages 587-591 ; 0769528414 (ISBN); 9780769528410 (ISBN) Toroghi Haghighat, T ; Esmaeili, M ; Saremi, A ; Mousavi, V. R ; Sharif University of Technology
    2007
    Abstract
    In this paper with the use of fuzzy genetic algorithm combination with evolutionary algorithms, as a method for local searching, it has been tried to exploit high capabilities of genetic algorithm, as a search algorithm, beside to other evolutionary algorithms, as local search algorithms, in order to increase efficiency of a rule learning system. For this purpose three hybrid algorithms have been used for solving the intrusion detection problem. These three algorithms are combination of genetic algorithm and SFL and PSO as three evolutionary algorithms which try to introduce efficient solutions for complex optimization problems by patterning from natural treatments. © 2007 IEEE  

    Shale volume estimation using ANN, SVR, and RF algorithms compared with conventional methods

    , Article Journal of African Earth Sciences ; Volume 205 , 2023 ; 1464343X (ISSN) Mohammadinia, F ; Ranjbar, A ; Kafi, M ; Shams, M ; Haghighat, F ; Maleki, M ; Sharif University of Technology
    Elsevier Ltd  2023
    Abstract
    The shale volume in the formation affects the petrophysical parameters of the reservoir, such as porosity, permeability, and saturation. Since these parameters indicate the amount of hydrocarbon in the reservoir and the reservoir producibility, shale volume determination is an essential challenge in the oil industry. This study compares conventional methods and Machine Learning (ML) algorithms to estimate the shale volume in the Fahliyan Formation in one of the oil fields in southern Iran. In this regard, the shale volume of the formation was calculated using Gamma-Ray (GR), Density-Neutron (DN), and Density-Sonic (DS) as well as ML methods such as Artificial Neural Networks (ANN), Support... 

    Physics-informed neural network simulation of multiphase poroelasticity using stress-split sequential training

    , Article Computer Methods in Applied Mechanics and Engineering ; Volume 397 , 2022 ; 00457825 (ISSN) Haghighat, E ; Amini, D ; Juanes, R ; Sharif University of Technology
    Elsevier B.V  2022
    Abstract
    Physics-informed neural networks (PINNs) have received significant attention as a unified framework for forward, inverse, and surrogate modeling of problems governed by partial differential equations (PDEs). Training PINNs for forward problems, however, pose significant challenges, mainly because of the complex non-convex and multi-objective loss function. In this work, we present a PINN approach to solving the equations of coupled flow and deformation in porous media for both single-phase and multiphase flow. To this end, we construct the solution space using multi-layer neural networks. Due to the dynamics of the problem, we find that incorporating multiple differential relations into the... 

    Decomposition of Poverty in Iran with Reference to Household’s Socioeconomic Characteristics, Using Integrated Macro and Micro Data

    , M.Sc. Thesis Sharif University of Technology Poursadeghi Haghighat, Soheil (Author) ; Neili, Farhad (Supervisor)
    Abstract
    This research uses the new approach of Son (2003) for the decomposition of poverty in Iran into three separate components of growth, inequality and population effects during 2001 to 2007 and meanwhile uses the integration of microeconomic and macroeconomic data together to increase the accuracy of the results. The main question of this research is to determine the orientation of development strategies for alleviation of poverty in Iran, which could be either growth-oriented or inequality-oriented ones. The resultes suggest that the former has always been pro-poor in Iran and has had the most dominant effect. Therefore, in order to decrease the poverty in Iran in the future, there should be... 

    Formal Analysis of Security Properties of Homomorphic-Cryptography-Based E-voting Protocols using µCRL

    , M.Sc. Thesis Sharif University of Technology Haghighat, Mohammad Hashem (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    With fast improvements of technology in advances in electronic voting systems, has been very effective in substantially reducing the disadvantages of traditional elections and thus enhancing the legitimacy of those being elective. These systems, to be effective,
    ought to be designed based on several security factors such as eligibility, correctness, voters' privacy, verifiability and receipt-freeness. One of the most important issues in this concept is ensuring the satisfaction of these properties. Using an incomplete and vulnerable system may cause negative consequences. Therefore, it is necessary to evaluate the system before implementation. Using formal methods for verification of... 

    Design and Comparison of Memristor Implementation for Different Machine Learning Algorithms

    , M.Sc. Thesis Sharif University of Technology Haghighat, Bahar (Author) ; Bagheri Shouraki, Saeed (Supervisor)
    Abstract
    The first physical realization of the missing fourth fundamental element of electrical circuits, namely memristor, in 2008 by HP labs triggered an immense amount of research on the capabilities of this element in implementing artificial neurons and artificial brain. In this project we will propose several reinforcement learning-based algorithms that are implemented on a specific memristor-based structure, the memristor crossbar structure. Hence we provide a learning paradigm that resembles the human learning paradigm not only because of the the algorithmic core, which is based on learning from sparse and delayed rewards and penalties, but also because of the hardware over which the...